pt. ONE ABOUT THE CERT RESILIENCE MANAGEMENT MODEL 1.Introduction 1.1.The Influence of Process Improvement and Capability Maturity Models 1.2.The Evolution of CERT-RMM 1.3.CERT-RMM and CMMI Models 1.4.Why CERT-RMM is not a Capability Maturity Model 2.Understanding Key Concepts in CERT-RMM 2.1.Foundational Concepts 2.1.1.Disruption and Stress 2.1.2.Convergence 2.1.3.Managing Operatio…
Terdapat bibliografi dan indeks. Table of contents: 1. The Handbook of System and Network Security Practices. I. SECURING COMPUTERS. 2. Securing Network Servers and User Workstations. 3. Securing Public Web Servers. 4. Deploying Firewalls. II. INTRUSION DETECTION AND RESPONSE. 5. Setting Up Intrusion Detection and Response Practices. 6. Detecting Signs of Intrusion. 7. Respondin…
Terdapat bibliografi dan indeks. Table of contents: Chapter 1: Why Is Security a Software Issue? 1.1 Introduction 1 1.2 The Problem 2 1.3 Software Assurance and Software Security 6 1.4 Threats to Software Security 9 1.5 Sources of Software Insecurity 11 1.6 The Benefits of Detecting Software Security Defects Early 13 1.7 Managing Secure Software Development 18 1.8 Summary 23 Chap…